[1]
W. Atkinson: Supply chain management: new opportunities for risk managers. Risk Management 53 (6), 10–15 (2006).
Google Scholar
[2]
C. Harland, R. Brenchley, H. Walker : Risk in supply networks. Journal of Purchasing & Supply Management 9 (2), 51–62 (2003).
DOI: 10.1016/s1478-4092(03)00004-9
Google Scholar
[3]
Rice Jr, F. Caniato : Building a secure and resilient supply network. Supply Chain Management Review 7 (5), 22–30 (2003).
Google Scholar
[4]
S. Wagner, C. Bode : An empirical investigation into supply chain vulnerability. Journal of Purchasing and Supply Management 12 (6), 301–312 (2006).
DOI: 10.1016/j.pursup.2007.01.004
Google Scholar
[5]
Martin Müller, Sonja Gaudig : An empirical investigation of antecedents to information exchange in supply chains (2008).
Google Scholar
[6]
Stephan M. Wagner, Christoph Bode : An empirical examination of supply chain performance along several dimensions of risk (2008).
DOI: 10.1002/j.2158-1592.2008.tb00081.x
Google Scholar
[7]
D Joel Wisner : A Structural Equation Model of Supply Chain Management Strategies and Firm verformxance, Journal of Business Logistics, Vol. 24, No. 1, pp.1-25 (2003).
DOI: 10.1002/j.2158-1592.2003.tb00030.x
Google Scholar
[8]
R. Smiley: Empirical evidence on strategic entry deterrence. International Journal of Industrial Organization, 6, 167e180 (1987).
Google Scholar
[9]
G.N. Stock, N.P Greis & J.D. Kasard : Logistics,strategy and structure conceptual framework. InternationalJournal OperationsandProductionManagement,18(1), 37e48 (1998)
Google Scholar